ПРОЕКТЫ 


  АРХИВ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  СТАТЬИ 


  ПЕРСОНАЛЬНОЕ 


  ПРОГРАММЫ 



ПИШИТЕ
ПИСЬМА














     АРХИВ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [security-alerts] FW: [SA21587] FreeBSD "ppp" Buffer Overflow Vulnerability



Dear Kazennov, Vladimir,

Ну  к  безопасности  почты  оно  слабо,  потому  как  во-первых атака на
канальном  уровне,  а  во-вторых, по-моему, еще и только против клиента.
Т.е. поломать можно диалапного клиента со стороны провайдера.

--Friday, August 25, 2006, 11:35:32 AM, you wrote to 
security-alerts@xxxxxxxxxxxxxx:

>> 
>> TITLE:
>> FreeBSD "ppp" Buffer Overflow Vulnerability
>> 
>> SECUNIA ADVISORY ID:
>> SA21587
>> 
>> VERIFY ADVISORY:
>> http://secunia.com/advisories/21587/
>> 
>> CRITICAL:
>> Moderately critical
>> 
>> IMPACT:
>> Exposure of sensitive information, DoS, System access
>> 
>> WHERE:
>> From remote
>> 
>> OPERATING SYSTEM:
>> FreeBSD 6.x
>> http://secunia.com/product/6778/
>> FreeBSD 5.x
>> http://secunia.com/product/1132/
>> FreeBSD 4.x
>> http://secunia.com/product/139/
>> 
>> DESCRIPTION:
>> A vulnerability has been reported in FreeBSD, which can be exploited
>> by malicious people to cause a DoS (Denial of Service), gain
>> knowledge about potentially sensitive information, and compromise a
>> vulnerable system.
>> 
>> The vulnerability is caused due to boundary errors within the ppp
>> driver when processing LCP (Link Control Protocol) options and can be
>> exploited by sending specially crafted LCP packets.
>> 
>> The vulnerability has been reported for all FreeBSD releases.
>> 
>> SOLUTION:
>> Update FreeBSD or apply patch.
>> 
>> Fixed versions:
>> 2006-08-23 22:01:44 UTC (RELENG_6, 6.1-STABLE)
>> 2006-08-23 22:02:25 UTC (RELENG_6_1, 6.1-RELEASE-p4)
>> 2006-08-23 22:02:52 UTC (RELENG_6_0, 6.0-RELEASE-p10)
>> 2006-08-23 22:03:55 UTC (RELENG_5, 5.5-STABLE)
>> 2006-08-23 22:04:28 UTC (RELENG_5_5, 5.5-RELEASE-p3)
>> 2006-08-23 22:04:58 UTC (RELENG_5_4, 5.4-RELEASE-p17)
>> 2006-08-23 22:05:49 UTC (RELENG_5_3, 5.3-RELEASE-p32)
>> 2006-08-23 22:06:08 UTC (RELENG_4, 4.11-STABLE)
>> 2006-08-23 22:06:40 UTC (RELENG_4_11, 4.11-RELEASE-p20)
>> 
>> Patch for FreeBSD 4.x:
>> http://security.FreeBSD.org/patches/SA-06:18/ppp4x.patch
>> http://security.FreeBSD.org/patches/SA-06:18/ppp4x.patch.asc
>> 
>> Patch for FreeBSD 5.3:
>> http://security.FreeBSD.org/patches/SA-06:18/ppp53.patch
>> http://security.FreeBSD.org/patches/SA-06:18/ppp53.patch.asc
>> 
>> Patch for FreeBSD 5.4, 5.5, and 6.x:
>> http://security.FreeBSD.org/patches/SA-06:18/ppp.patch
>> http://security.FreeBSD.org/patches/SA-06:18/ppp.patch.asc
>> 
>> PROVIDED AND/OR DISCOVERED BY:
>> The vendor credits Martin Husemann and Pavel Cahyna.
>> 
>> ORIGINAL ADVISORY:
>> http://security.freebsd.org/advisories/FreeBSD-SA-06:18.ppp.asc
>> 



-- 
~/ZARAZA
Клянусь лысиной пророка Моисея - я тебя сейчас съем. (Твен)





 




Copyright © Lexa Software, 1996-2009.